Twin K-Shuffle Based Audio Steganography
DOI:
https://doi.org/10.51983/ajeat-2022.11.1.3200Keywords:
Steganography, K-Shuffle, Bit-Shuffling, Secret Message, Cover Audio, Stego Audio, Embedding Function, Extraction FunctionAbstract
Secure communication is most effective when it is covert. In the realm of covert communication, steganography conceals secret message within a cover medium. This ensures that adversaries who have access to this carrier medium are unaware of the existence of the secret message. This paper proposes a novel twin K-Shuffling and embedding technique that scrambles and hides secret message inside audio samples. The scrambling phase of the proposed technique consists of bit and character shuffling. The bit-shuffling scrambles the bit-string of each character in the secret message into cipher-text via K-Shuffle. The characters of the resulting cipher-text are then shuffled by another K-Shuffle technique to yield chaotic cipher-text. At the embedding phase, the scrambled cipher-text is randomly planted into the carrier audio samples. The novelty in this proposed technique is the provision of a three-layer protection for secret messages; bit, character, and encoding layers. Results and analyses show that this technique satisfied both embedding and encryption requirements of steganographic systems.
References
R. Manisha, and T. Manisha, "Genetic algorithm in audio steganography," ArXiv: abs/1407.2729, vol. 13, no. 1, pp. 29-34, 2014.
N. Cvejic, and T. Seppanen, "Increasing the capacity of LSB-based audio steganography," 2002 IEEE Workshop on Multimedia Signal Processing, St. Thomas, VI, USA, 2002. [Online]. Available: https://doi.org/10.1109/MMSP.2002.1203314
A. Koyun, and H. B. Macit, "Generating a stego-audio data using LSB technique and robustness test," Journal of Engineering Sciences and Design, vol. 6, no. 1, pp. 87-92, 2018.
K. Bhowal, D. Bhattacharyya, A. J. Pal, and T. H. Kim, "A GA based audio steganography with enhanced security," Telecommunication Systems, vol. 52, no. 4, pp. 2197-2204, 2011.
K. Bhowal, A. J. Pal, G. S. Tomar, and P. P. Sarkar, "Audio steganography using GA," 2010 International Conference on Computational Intelligence and Communication Networks, 2010. [Online]. Available: https://doi.org/10.1109/CICN.2010.91
K. M. Christine, "Genetic algorithm based model in text steganography," The African Journal of Information Systems, vol. 5, no. 4, pp. 131-144, 2013.
B. A. Mitras, and N. F. H. al-Alusi, "Using hybrid genetic algorithm in audio steganography," Iraqi Journal of Statistical Sciences, vol. 13, no. 25, pp. 150-164, 2013.
C. C. Sobin, and V. M. Manikandan "A Secure Audio Steganography Scheme using Genetic Algorithm," 5th Proceedings of the IEEE International Conference Image Information Processing, ICIIP 2019, pp. 403-407, 2019.
S. F. Sultana, and D. C. Shubhangi, "Video encryption algorithm and key management using perfect shuffle," Int. Journal of Engineering Research and Application, vol. 7, no. 7, pp. 01-05, 2017.
S. Alhassan, M. M. Iddrisu, and M. I. Daabo, "Securing audio data using K-shuffle technique," Multimedia Tools and Applications, vol. 78, no. 23, pp. 33985-33997, 2019.
R. W. Packard, and E. S. Packard, "The Order of a perfect k-shuffle," The Official Journal of the Fibonacci Association, pp. 136-44, 1994.
D. Persi, R. L. Graham, and W. M. Kantor, "The Mathematics of Perfect Shuffles," Advance in Applied Mathematics, vol. 4, pp. 175-196, 1983.
I. Z. Alhassan, E. D. Ansong, G. Abdul-Salaam, and S. Alhassan, "Enhancing image security during transmission using residue number system and K-shuffle," Earthline Journal of Mathematical Sciences, vol. 4, no. 2, pp. 399-424, 2020.
R. Kaur, J. Bhatia, H. S. Saini, and R. Kumar, "Multilevel Technique to Improve PSNR and MSE in Audio Steganography," International Journal of Computer Applications, vol. 103, pp. 1-4, 2014.
Z. Wang and A. C. Bovik, "Mean Squared Error: Love It or Leave It?", IEEE Signal Processing Magazine, 2009. [Online]. Available: https://doi.org/10.1109/MSP.2008.930649.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.